Which of the following security threats does NOT use software to extract sensitive information or credentials?

Which of the following security threats does NOT use software to extract sensitive information or
credentials?

Which of the following security threats does NOT use software to extract sensitive information or
credentials?

A.
Grayware

B.
Shoulder surfing

C.
Malware

D.
Man-in-the-Middle exploits



Leave a Reply 0

Your email address will not be published. Required fields are marked *